logo
 
   
   
  NABCB  
  JAS-ANZ  
  EMS AND OHSAS DAC  
  HACCP AND FSMS DAC  
  NABCB & JAS-ANZ  
  IRCA  
  NABCB OHSAS Certificate  
  +91 129 4162505
  +91 129 4175510-16
  Telefax +91 129 4162505 (Telefax)
  sales@bsc-icc.com
Management Systems Training  

Advanced Implementation Course - Information Security Management Systems (ISMS)

TRAINING
    Advanced Implementation Training Course: ISMS 27001

PARTICIPANTS RECEIVE:

  • ISMS Slides including Exercises
  • ISMS 27001 standard
  • Certificate of Advance Implementation Course for ISO 27001 (We will conduct a test at the end of training and all successful candidate will be issued this certificate)

DURATION:

3 DAYS

LEARNING OUTCOMES

By the end of the course you will be able to understand:

Knowledge of the techniques & tools used in information security system.

Understanding the importance of asset & owner identification.

Understanding the threats, vulnerabilities and impacts

WHO SHOULD ATTEND?

  • This three (3) days course has been developed to provide delegates with the knowledge to implement ISO 27001 in their organizations.
  • This course is designed for those who need to understand the techniques & tools used in information security system

COURSE CONTENT AND STRUCTURE:

Course starts at 9:00 A.M. and ends approximately at 6:00 P.M. The course includes a series of presentations, Examples, Exercises involving group activities, Brain Storming, Case Studies, Readings and Sharing of Practical Experiences.

Maximum attendance: 20 Delegates.

ELIGIBILITY?

Information Security Practitioners, e.g. information security consultants, IT Security Managers & IT personnel

COURSE FACILITATORS:

All course facilitators are highly qualified and experienced both in training and assessment of Information Security Management Systems. We strongly believe that the experience in Information Security Management Assessment and Training skills is a right combination to deliver a practical training course. They are selected on their ability to make BSCIC courses both practical and enjoyable.

The key content include:

Tools & Techniques used in information Security Management.

Difference between risk assessment & risk evaluation.

Range of application for an ISMS

Performing an information security internal audit
Range of application for an ISMS
Audit programming
Reporting the audit
Responsibilities of an auditor
Corrective action and follow-up

HOW TO APPLY?

To apply for this course please obtain/download our Participant Nomination Form and mail to training1@bsc-icc.com. Please make advance payment* to reserve a seat in our course. For any cancellation please request at least 2 days in advance to the commencement of the course. Transfer of Nomination is acceptable.

* BSCIC reserves right for no refunding the advance fee paid in case the request for cancellation is received late.

 
Apply Online Contact Us  
 

 

 
     
     
  Site by Petals Interactive